top banner main image
Start for free. Then get your first month for just $1 on select plans.
Start for free

AfterShip Trust Centre

At AfterShip, we are committed to protecting customer data and continually earning our customer’s trust. We embed security and privacy into every product decision we make and operational process we design, and we back that commitment with audited controls, adherence to applicable data protection regulations, and clear, transparent documentation.
aftership trust centrepng vaftership trust centrepng v

Trusted by the world’s biggest brands

Compliance Certifications and Frameworks

Certified by rigorous global security and privacy standards, AfterShip prioritizes data protection. We ensure all data remains secure through robust policies, advanced technology, and ongoing monitoring to prevent breaches and unauthorized use. Detailed reports on our security protocols are available upon request.
socii

Control procedures and audits

AfterShip undergoes extensive audits to ensure our security and privacy control procedures meet industry standards and are verified in a SOC 2 Type II report.
iso

Information security management

AfterShip holds ISO 27001 certification, the global standard for implementing information security management systems (ISMS) controls.
gdpr

Data privacy

AfterShip fully complies with the most rigorous data privacy laws and regulations, such as the General Data Protection Regulation (GDPR).
center for internet security cis

Secure system configuration

AfterShip follows the Center for Internet Security (CIS) Benchmarks to harden our cloud infrastructure and systems against common threats, aligning configurations with industry-accepted best practices.
owasp

Application security best practices

AfterShip follows the OWASP Top 10 guidance throughout our software development lifecycle to identify, mitigate, and prevent the most critical web application security risks.
Contact us for more information

Legal, Privacy, and Security Documents

Privacy Policy

Our Privacy Policy explains how AfterShip collects, uses, stores, and protects personal data, and describes the rights available to individuals under applicable data protection laws.

Cookie Policy

Our Cookie Policy details how and why cookies and similar technologies are used on our websites and services, and how users can manage their preferences.

Data Processing Agreement

Our DPA defines AfterShip’s data protection obligations when processing personal data on behalf of customers, including security measures, subprocessors, and data subject rights.

Subprocessors

Our Subprocessors list provides transparency into the third parties we engage to support our services and the safeguards in place to protect customer data.

Service Level Agreement

Our Service Level Agreement outlines AfterShip’s service availability commitments and support standards for eligible enterprise customers.
Security and Privacy at AfterShip Mobile

Security and Privacy at AfterShip

The AfterShip Services are hosted on Google Cloud Platform and Amazon Web Service in the United States of America and are protected by security and environmental controls. Google Cloud Platform and Amazon Web Service regularly undergo independent verification of security, privacy, and compliance controls. Additional details are available at:

AfterShip configures the firewalls on the production environment according to industry best practices and monitors unauthorized intrusions' services. AfterShip also uses Cloudflare WAF to block cyber-attacks. AfterShip performs automated vulnerability scans on the production environment and remediates any findings that present a risk to our environment. Additionally, AfterShip undergoes annual third-party penetration testing. A bug bounty program through HackerOne is also maintained, where security researchers are invited to submit vulnerabilities to AfterShip throughout the year. Additionally, the security review process facilitated by the security team is an integral part of AfterShip’s development lifecycle and the industry security coding and review practices are followed.

AfterShip regularly performs security awareness training for all staff. AfterShip also offers 24/7 security monitoring and incident response.

Product Security

AfterShip prioritizes system and data security through secure product development. Enjoy built-in protection for your apps, identities, and information.

Highlights

  • Audit logging
  • Multi-factor authentication (MFA/2FA)
  • Role-based access control (RBAC)
  • Single sign-on (SSO)
  • Strong password requirements 
Product Security
Data Security

Data Security

AfterShip follows strict protocols for the diligent collection, storage, processing, sharing, and deletion of your data as outlined in our Privacy Policy.

Highlights

  • Access monitoring 
  • Routine database backups and recovery practices
  • Data breach notifications made to customers within the time limits established under the GDPR
  • Data collection and processing per user instructions
  • Data erasure per user instructions or according to established retention periods
  • Encryption-in-transit (TLS 1.2) and encryption-at-rest (AES-256)

Application Security

AfterShip continuously monitors system security and reliability, taking proactive measures to enhance data availability in worst-case scenarios.

Highlights

  • Annual third-party penetration tests
  • Automated vulnerability scanning and remediation
  • Bug bounty program
  • Cloudflare WAF to block cyber-attacks
  • Code analysis
Application Security
Infrastructure Security

Infrastructure Security

AfterShip proactively monitors our systems to ensure reliable, consistent, and trustworthy service.

Highlights

  • 24/7 proactive monitoring and incident response
  • Business continuity and disaster recovery controls
  • Services hosted on AWS and Google Cloud in the United States

Network Security

AfterShip protects its network perimeter and internal traffic through layered controls and continuous monitoring to block threats, detect anomalies, and safeguard customer data.

Highlights

  • Employee access to platforms controlled through SSO and MFA/2FA
  • Firewalls configured according to industry best practices
  • Intrusion detection and protection systems
  • Security Information & Event Management (SIEM)
  • Virtual Private Cloud
Network Security
Corporate Security

Corporate Security

AfterShip adheres to industry standards and best practices. Ongoing training ensures employees are up-to-date on the latest policies and processes.

Highlights

  • Asset management practices
  • Crisis Management and Information Security Incident Management policies
  • Email protection
  • ISO 27001-based ISMS
  • HR background checks for all new hires
  • Onboarding and subsequent annual information security trainings for all employees

Data Protection Compliance – For Your Benefit

Have peace of mind knowing that AfterShip protects your data.

Overview and Data Protection Law Basics

European-Specific Data Privacy Information

AfterShip’s DPO, GDPR Representative, and Employees

Data Subject and Data Controller Requests

The following describes how personal data is managed when AfterShip receives a request from the individual whose personal data is being processed by AfterShip (each a “data subject”) or AfterShip’s customers, when they instruct AfterShip to process personal data. There are several different obligations that apply to AfterShip when it processes personal data. AfterShip might encounter requests from different parties to perform actions with respect to types of personal data that are stored or processed by AfterShip. In most cases, a data controller will be AfterShip’s customer or logistics partner, and AfterShip will act as data processor, in accordance with the applicable data protection laws and the DPA. Please find below: (i) the process implemented by AfterShip, and (ii) an overview of data subject rights.

AfterShip Process for the Implementation of Rights

To ensure that the rights described in Section 2 are respected, AfterShip has implemented the following procedures:

Data Protection Rights

Data subjects have a number of rights under Applicable applicable data protection laws.

Status Transparency

We proactively monitor our uptime status, making us a reliable, consistent and trustworthy partner.

More Questions?

If you believe you have found a security vulnerability in an AfterShip application, the AfterShip platform, or our infrastructure that could harm AfterShip or anyone who uses AfterShip, contact both [email protected] and [email protected].

For questions related to personal data or privacy, or for data subject requests or data controller requests, contact [email protected].

For questions related to account login, account security, or billing, visit our help center or contact our Support team at [email protected].